In persasive environments, with the possibility of offering users distributed access on applications and services, from anywhere and at anytime, new issues arise with regard to access control mechanism. Generaly, the existing access control solutions make static user-permission associations and are unaware of the situation (context) when defining and enforcing access control policies. In order to address these issues, we propose a family of Context-Based Access Control models, named CxtBAC (Context-Based Access Control), which is composed by eight conceptual models that can be used as basis to construct context-based access control solutions. CxtBAC models explore contextual information as central concept for assigning permissions to users....
Context-aware computing is an important aspect of the pervasive computing environment and its variou...
As computer infrastructures become more complex, security models must provide means to handle more f...
One of the aspects of autonomic computing is self-protecting where systems are required to consisten...
In persasive environments, with the possibility of offering users distributed access on applications...
Due to the rapid advancement of communication technologies, the ability to support access control to...
In modern communication environments, the ability to provide access control to services in a context...
In the present age, context-awareness is an important aspect of the dynamic environments and the dif...
Abstract—Due to the rapid advancement of communication technologies, the ability to support access c...
Abstract. In modern communication environments, the ability to pro-vide access control to services i...
The role-based access control (RBAC) has become the widely used access control system for providing ...
This paper presents an approach that uses special purpose RBAC constraints to base certain access co...
Abstract. Context-aware systems acquire and integrate multi-faceted know-ledge about their environme...
The appearance of dynamic distributed networks in early eighties of the last century has evoked tech...
Role based access control (RBAC) assigns access permissions to a role rather than a user. This simpl...
ABSTRACT Widely strewn resources have made organizations engrossed to know not only who, when and fr...
Context-aware computing is an important aspect of the pervasive computing environment and its variou...
As computer infrastructures become more complex, security models must provide means to handle more f...
One of the aspects of autonomic computing is self-protecting where systems are required to consisten...
In persasive environments, with the possibility of offering users distributed access on applications...
Due to the rapid advancement of communication technologies, the ability to support access control to...
In modern communication environments, the ability to provide access control to services in a context...
In the present age, context-awareness is an important aspect of the dynamic environments and the dif...
Abstract—Due to the rapid advancement of communication technologies, the ability to support access c...
Abstract. In modern communication environments, the ability to pro-vide access control to services i...
The role-based access control (RBAC) has become the widely used access control system for providing ...
This paper presents an approach that uses special purpose RBAC constraints to base certain access co...
Abstract. Context-aware systems acquire and integrate multi-faceted know-ledge about their environme...
The appearance of dynamic distributed networks in early eighties of the last century has evoked tech...
Role based access control (RBAC) assigns access permissions to a role rather than a user. This simpl...
ABSTRACT Widely strewn resources have made organizations engrossed to know not only who, when and fr...
Context-aware computing is an important aspect of the pervasive computing environment and its variou...
As computer infrastructures become more complex, security models must provide means to handle more f...
One of the aspects of autonomic computing is self-protecting where systems are required to consisten...